Search results

    De-identified, Anonymized, or Aggregated? A Look around the GlobePEPR '23Katharina Koerner
    Beware, Data Processing! Proposing Categories for Risk Communication Related to the Processing of Personal DataPEPR '23Lukas Seiling
    The Missing Link in Privacy Risk AssessmentsPEPR '23Jared Maslin
    Putting Privacy on the MapPEPR '23Jayati Dev
    Designing for Privacy Needs of Bystanders in Smart Homes: A Systematic Review of RecommendationsPEPR '23Julia Bernd
    How Does AI Change Privacy? Towards Helping Practitioners Scope, Motivate, and Conduct Privacy Work for AI Products and ServicesPEPR '23Dr. Sauvik Das
    Spot the Fed: Mastodon, the Fediverse, and Why You Can't Run Servers Like It's 1999PEPR '23Tariq Yusuf
    Evolution of Privacy Pass at CloudflarePEPR '23Thibault Meunier—Open Source Tests of Web Browser PrivacyPEPR '23Arthur Edelstein
    Using Content Security Policy for PrivacyPEPR '23Devin Lundberg
    Looking beyond Prompts for Permissions in ChromePEPR '23Serena Chen
    Cookie Infrastructure at MetaPEPR '23Katriel Cohn-Gordon
    Reimagining User Authentication for Digital Health Services: A User-Centered ApproachPEPR '23Bo Kim
    Striking the Balance: Safeguarding Customer Privacy While Empowering EmployeesPEPR '23Emily Greene
    Rethinking Data Minimization from a User-Centered Approach: A Paradigm ShiftPEPR '23Tanusree Sharma
    Privacy for All: Achieving Inclusive Privacy in the Digital Age PEPR '23Sri Pravallika Maddipati, Norbert Nthala
    Protecting User Privacy in Private Set Intersection: A Journey Toward Mitigating User TrackingPEPR '23Jian Du
    Towards the Deployment of Secure Computation Tools in Genomics: A Sociotechnical PerspectivePEPR '23Natnatee "Ko" Dokmai
    Securing and Standardizing Data Rights Requests with a Data Rights ProtocolPEPR '23Ryan Rix
    Building a Complete Export Ecosystem—From DSAR Automation to Privacy Center PEPR '23Pankaj Mohapatra
    Data Access Automation at ScalePEPR '23Miró Khalifa
    A People-First Approach to Introducing Process and Tools for Technical Privacy ReviewPEPR '23Ryan Tenorio
    How to Utilize Your Red Team for PrivacyPEPR '23David Renardy
    Privacy-Preserving Analytics on the GroundPEPR '23Ryan Steed
    Privacy in the Public Sector: Lessons Learned and Strategies for SuccessPEPR '23Alan Tang, Anshu Singh